Skip to main content
guest
Join
|
Help
|
Sign In
SUNYCortlandCAP104
Home
guest
|
Join
|
Help
|
Sign In
SUNYCortlandCAP104
Wiki Home
Recent Changes
Pages and Files
Members
Favorites
20
All Pages
20
home
1 Introduction
2 Live & Communicate
3 Future of Computing
4 Crime, Privacy & Law
5 Workplace & Careers
6 Local & Global Issues
7 Ethical Issues
Add
Add "All Pages"
Done
4 Crime, Privacy & Law
Edit
0
80
…
0
Tags
No tags
Notify
RSS
Backlinks
Source
Print
Export (PDF)
Crime, Privacy & the Law
Course Objectives
:
1) Define computer crime and provide examples
2) Discuss and provide examples of how computer technology can encroach on an individual’s privacy and identify legislation that has been or has been proposed to prevent such encroachment
Cyber Basics
US-CERT United States Computer Emergency Readiness Team (n.d.) Virus Basics Retrieved from
http://www.us-cert.gov/reading_room/virus.html
US-CERT United States Computer Emergency Readiness Team (n.d.) Cyber Threats to Mobile Devices Retrieved from
http://www.us-cert.gov/reading_room/TIP10-105-01.pdf
Cyber Crime
Bureau of Justice Assistance U.S. Department of Justice (2011) Internet Crime Complaint Center (IC3) Internet Crime Report Retrieved from
http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf
Bussewitz, C. (2012) Sellers beware: Check the check Retrieved from
http://www.pressdemocrat.com/article/20120608/ARTICLES/206081028?p=1&tc=pg
FBI (2009) Online Auction Fraud Retrieved from
http://www.fbi.gov/news/stories/2009/june/auctionfraud_063009
FBI (2009) High Tech Heist 2,100 ATMs Worldwide Hit at Once Retrieved August 8, 2011 from
http://www.fbi.gov/news/stories/2009/november/atm_111609
Stone, B. (2009) 3 Indicted in Theft of 130 Million Card Numbers Retrieved from
http://www.nytimes.com/2009/08/18/technology/18card.html
Cyber Espionage and Cyber Warfare
Alperovitch, D. (2011) Revealed: Operation Shady Rat MacAfee White Paper Retrieved from
http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf
Haddick, R. (2011) This Week at War: Lessons from Cyber war I Retrieved from
http://www.foreignpolicy.com/articles/2011/01/28/this_week_at_war_lessons_from_cyberwar_i
Hodge, N. and Entous, A. (2011) Oil Firms Hit by Hackers from China, Report says Retrieved from
http://online.wsj.com/article/SB10001424052748703716904576134661111518864.html
Masters, J. (2011) Confronting the Cyber Threat Retrieved August 21, 2011 from
http://www.cfr.org/technology-and-foreign-policy/confronting-cyber-threat/p15577
The New York Times (2012) Cyber attacks on Iran - Stuxnet and Flame Retrieved from
http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_malware/stuxnet/index.html
Legislation
PBS Frontline (2012) Computer Crime Laws Retrieved from
http://www.pbs.org/wgbh/pages/frontline/shows/hackers/blame/crimelaws.html
Shiels, M. (2010) US tech coalition calls for new online privacy law BBC News Retrieved from
http://news.bbc.co.uk/2/hi/technology/8595775.stm
Privacy
CBS News (2011) Did the Internet Kill Privacy? Retrieved from
http://www.cbsnews.com/8301-3445_162-7323148.html
Privacy Rights Clearing House (2011) Fact Sheet 7: WorkPlace Privacy and Employee Monitoring. Retrieved July 14, 2011 from
https://www.privacyrights.org/fs/fs7-work.htm
Savage, David G. (2010) High Court Rejects Workers' Text Privacy. Retrived July 14, 2011 from
http://seattletimes.nwsource.com/html/nationworld/2012145845_scotus18.html
Smith, Catherine and Craig Kanalley. (2011) Fired Over Facebook: 13 Posts That Got People CANNED. Retrieved July 14, 2011 from
http://www.huffingtonpost.com/2010/07/26/fired-over-facebook-posts_n_659170.html#s115707&title=Swiss_Woman_Caught
Zeider, Rita. (2007) Hr Magazine: How Deep Can You Probe? Retreived July 18, 2011 from
http://www.shrm.org/Publications/hrmagazine/EditorialContent/Pages/1007sr-zeidner.aspx
Javascript Required
You need to enable Javascript in your browser to edit pages.
help on how to format text
Turn off "Getting Started"
Home
...
Loading...
Crime, Privacy & the Law
Course Objectives:
1) Define computer crime and provide examples
2) Discuss and provide examples of how computer technology can encroach on an individual’s privacy and identify legislation that has been or has been proposed to prevent such encroachment
Cyber Basics
US-CERT United States Computer Emergency Readiness Team (n.d.) Virus Basics Retrieved from
http://www.us-cert.gov/reading_room/virus.html
US-CERT United States Computer Emergency Readiness Team (n.d.) Cyber Threats to Mobile Devices Retrieved from
http://www.us-cert.gov/reading_room/TIP10-105-01.pdf
Cyber Crime
Bureau of Justice Assistance U.S. Department of Justice (2011) Internet Crime Complaint Center (IC3) Internet Crime Report Retrieved from
http://www.ic3.gov/media/annualreport/2011_IC3Report.pdf
Bussewitz, C. (2012) Sellers beware: Check the check Retrieved from
http://www.pressdemocrat.com/article/20120608/ARTICLES/206081028?p=1&tc=pg
FBI (2009) Online Auction Fraud Retrieved from
http://www.fbi.gov/news/stories/2009/june/auctionfraud_063009
FBI (2009) High Tech Heist 2,100 ATMs Worldwide Hit at Once Retrieved August 8, 2011 from
http://www.fbi.gov/news/stories/2009/november/atm_111609
Stone, B. (2009) 3 Indicted in Theft of 130 Million Card Numbers Retrieved from
http://www.nytimes.com/2009/08/18/technology/18card.html
Cyber Espionage and Cyber Warfare
Alperovitch, D. (2011) Revealed: Operation Shady Rat MacAfee White Paper Retrieved from
http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf
Haddick, R. (2011) This Week at War: Lessons from Cyber war I Retrieved from
http://www.foreignpolicy.com/articles/2011/01/28/this_week_at_war_lessons_from_cyberwar_i
Hodge, N. and Entous, A. (2011) Oil Firms Hit by Hackers from China, Report says Retrieved from
http://online.wsj.com/article/SB10001424052748703716904576134661111518864.html
Masters, J. (2011) Confronting the Cyber Threat Retrieved August 21, 2011 from
http://www.cfr.org/technology-and-foreign-policy/confronting-cyber-threat/p15577
The New York Times (2012) Cyber attacks on Iran - Stuxnet and Flame Retrieved from
http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_malware/stuxnet/index.html
Legislation
PBS Frontline (2012) Computer Crime Laws Retrieved from
http://www.pbs.org/wgbh/pages/frontline/shows/hackers/blame/crimelaws.html
Shiels, M. (2010) US tech coalition calls for new online privacy law BBC News Retrieved from
http://news.bbc.co.uk/2/hi/technology/8595775.stm
Privacy
CBS News (2011) Did the Internet Kill Privacy? Retrieved from
http://www.cbsnews.com/8301-3445_162-7323148.html
Privacy Rights Clearing House (2011) Fact Sheet 7: WorkPlace Privacy and Employee Monitoring. Retrieved July 14, 2011 from
https://www.privacyrights.org/fs/fs7-work.htm
Savage, David G. (2010) High Court Rejects Workers' Text Privacy. Retrived July 14, 2011 from
http://seattletimes.nwsource.com/html/nationworld/2012145845_scotus18.html
Smith, Catherine and Craig Kanalley. (2011) Fired Over Facebook: 13 Posts That Got People CANNED. Retrieved July 14, 2011 from
http://www.huffingtonpost.com/2010/07/26/fired-over-facebook-posts_n_659170.html#s115707&title=Swiss_Woman_Caught
Zeider, Rita. (2007) Hr Magazine: How Deep Can You Probe? Retreived July 18, 2011 from
http://www.shrm.org/Publications/hrmagazine/EditorialContent/Pages/1007sr-zeidner.aspx